In the Linux kernel, the following vulnerability has been resolved:
usb: idmouse: fix an uninit-value in idmouse_open
In idmousecreateimage, if any ftipcommand fails, it will go to the reset label. However, this leads to the data in bulkin_buffer[HEADER..IMGSIZE] uninitialized. And the check for valid image incurs an uninitialized dereference.
Fix this by moving the check before reset label since this check only be valid if the data after bulkinbuffer[HEADER] has concrete data.
Note that this is found by KMSAN, so only kernel compilation is tested.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50733.json",
"cna_assigner": "Linux"
}